Remote Sensing

Remote Sensing

CLSR NovDec.qxd 10/22/01 12:06 PM Page 417 ABA Draft PKI Assessment Guidelines requirements behind PKI as well as highlighting the benefits and p...

58KB Sizes 3 Downloads 280 Views

CLSR NovDec.qxd

10/22/01

12:06 PM

Page 417

ABA Draft PKI Assessment Guidelines

requirements behind PKI as well as highlighting the benefits and pitfalls that face practitioners in this area.

Kimberly B. Kiefer is a Senior Associate in the Business and Technology Group of the law firm of Brobeck, Phleger & Harrison LLP (Washington, D.C. Office), a member of the PAG’s Editorial Board, and the incoming Co-Chair of the ISC. The author acknowledges the contributions of the Editorial Board (Joseph Alhadeff; Michael Baum; Barclay Blair; Charles R.Merrill; Michael Power; Randy Sabett; Ruven Schwartz; Gary Stoneburner; Ben Wilson; and Stephen Wu) and the Individual Contributors (see PAG § A.5.2) to the preparation of the PAG. The public comment period for the draft PAG extended until October 18, 2001. Shortly after the close of the comment period, the ISC will produce a new (final) version of the PAG reflecting the comments received. The ISC welcomes, encourages, and is requesting comments from a wide readership,

including professionals in the business and legal community, consumer advocates, and technical experts. (The PAG has already received contributions from over 400 professionals). To submit comments on the PAG, please use the comment form provided at: . Comments may be submitted by E-mail to: pag- [email protected]. By fax to: +1 (312) 988-5628 or by mailing them to: PAG Editorial Board, Information Security Committee, Section of Science and Technology Law, American Bar Association, 750 North Lake Shore Drive, Chicago, IL 60611-4497.

FOOTNOTES 1 All quotations herein refer to the following source: “ABA ISC PAG Public Draft for Comment Only.” 2 The author is very appreciative of the comments provided by Mr. Joseph Alhadeff, Vice President of Global Public Policy and Chief Privacy Officer at Oracle, for this section.

BOOK REVIEW Remote Sensing Radio Interferometry – Data Interpretation and Error Analysis, by Ramon F. Hanssen, 2001, Kluwer Academic Publishers, hard-ccover, 308 pp., EUR75; US$69; £47, ISBN 0 7923 6945 9 This text examines satellite radar interferometry – a new remote sensing technique used for geodetic applications such as topographic mapping and for high-accuracy monitoring of deformation of the earth’s crust. It is the product of five and half years of research and was undertaken by the author because he realized that this technique was extremely useful for widescale fine-resolution deformation measurements. This book reviews the basic concepts of radar, imaging radar and radar interferometry, and revisits the processing procedure for obtaining interfermetric products such as digital elevation modelling or a deformation map. Available from Kluwer Academic Publishers, PO Box 17, 3300 AA Dordrecht, The Netherlands. For North and South America, contact Kluwer at: 101 Philip Drive, Norwell, MA 02061, USA.

BOOK REVIEW Security Management Security Operations Management, by Robert D. McCrie, 2001, Butterworth Heinemann, hard-ccover, 416 pp., £30.00, ISBN 0 7506 7087 8 Security Operations Management has been written for practitioners, students and general managers who are involved with or interested in managing security operations more effectively. Its aim is to examine the process of protecting people, physical assets, intellectual property and opportunity. The work notes that security programmes in the workplace have grown robustly in recent times, while the security trade and professional organizations involved have grown in numbers in their specializations and aggregate membership. The work is divided into two sections, part one dealing with general fundamentals and competences. This includes a basic description of security operations in a management environment, core competencies, staffing, training and development, support and motivation, and appraising and promoting people in security programmes. The second part is devoted to special issues in security management and deals with the discipline and discharge of staff, accounting controls and budgeting, operating personnel intensive programmes, physical and technology centred programmes, and leadership for ‘optimal’ security operations. The appendices contain a code of ethics of the American Society for Industrial Security and the report on the Taskforce on Private Security which identified standard and goals for private security. Available from Butterworth Heinemann, Linacre House, Jordan Hill, Oxford, OX2 8DP; tel: +44 (0)1865 310366; Internet: .

417